• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

seccomp / libseccomp / 28 / 1
67%
main: 89%

Build:
Build:
LAST BUILD BRANCH: release-2.6
DEFAULT BRANCH: main
Ran 23 Feb 2017 05:51PM UTC
Files 53
Run time 3s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

23 Feb 2017 05:27PM UTC coverage: 66.957% (+0.08%) from 66.875%
28.1

push

travis-ci

pcmoore
bpf: don't catch the -1 syscall in the x32/x86_64 check

The -1 syscall can be used by a tracing process to skip a syscall,
which up until Linux v4.8 was of no concern for libseccomp since the
seccomp filter was only executed at the start of the syscall and not
after the tracing process was notified, however recent kernels also
execute the seccomp filter after the tracing process finishes its
syscall handling; this caused problems on x86_64 systems that didn't
explicitly add an x32 architecture to their filters.

This patch fixes the x32 check to treat the -1 syscall like any other
syscall.

Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit ba73ee4f5)

1615 of 2412 relevant lines covered (66.96%)

176139.03 hits per line

Source Files on job 28.1
  • Tree
  • List 0
  • Changed 7
  • Source Changed 6
  • Coverage Changed 7
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 28
  • Travis Job 28.1
  • 0006b53a on github
  • Prev Job for on release-2.3 (#26.1)
  • Next Job for on release-2.3 (#38.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc